A software development and security testing model where one team builds the software, a second team tries to break it (find vulnerabilities), and the original team fixes them.
- Metodologías: Ingeniería, Diseño de producto, Gestión de proyectos
Build It Break It Fix It

Build It Break It Fix It
- Emulación de adversarios, Metodología ágil, Mejora continua, Ciberseguridad, Seguro de calidad, Control de calidad, Gestión de riesgos, Pruebas de software
Objetivo:
Cómo se utiliza:
- This model is often used in security competitions or internal security reviews to rigorously test a system's defenses by simulating attacks from a dedicated 'break-it' team.
Ventajas
- Promotes a security-conscious development culture, effectively identifies vulnerabilities through a dedicated adversarial approach, and provides a realistic test of system resilience.
Contras
- Can be resource-intensive and time-consuming, may create an adversarial relationship between teams, and is more focused on security than general functionality bugs.
Categorías:
- Ingeniería, Calidad, Gestión de riesgos
Ideal para:
- Rigorously testing the security of software by having dedicated teams for building and attacking the system.
The Build It Break It Fix It methodology is widely applied in various industries such as information technology, telecommunications, and financial services, particularly during the design and development phases of software and infrastructure systems. This approach can be initiated by internal security teams, independent security consultants, or even external bug bounty programs that encourage participation from ethical hackers and security researchers. Participants typically include software developers, security analysts, and system architects who collaborate to construct the system while simultaneously engaging a dedicated ‘break-it’ team tasked with launching simulated attacks to uncover vulnerabilities. This methodology proves beneficial in environments where high-stakes data protection is required, as seen in sectors like healthcare and e-commerce, where data breaches can have severe consequences. During the project’s lifecycle, iterative cycles of building, testing by attacking, and then fixing identified vulnerabilities support continuous improvement and reinforce a proactive security posture. This iterative approach also enhances communication among team members, as developers receive direct feedback from testers, encouraging a culture of secure coding practices. Conducting these exercises regularly ensures that security measures evolve in tandem with emerging threats, making systems robust against potential attacks.
Pasos clave de esta metodología
- Design and implement the software product with security best practices embedded in the process.
- Formulate an attack plan that includes various threat models and attack vectors.
- Execute simulated attacks on the system using the pre-defined scenarios.
- Document each vulnerability discovered during the attack phase for analysis.
- Prioritize vulnerabilities based on severity and potential impact on the system.
- Develop and apply fixes for the identified vulnerabilities and weaknesses.
- Re-test the system post-fix to ensure vulnerabilities have been effectively addressed.
- Iterate through the build, break, and fix cycle as needed to enhance security continuously.
Consejos profesionales
- Conduct post-attack reviews to refine both build and break strategies, ensuring lessons from each test are integrated into the development process.
- Utilize automated tools alongside manual testing for comprehensive coverage, identifying potential vulnerabilities more efficiently and consistently.
- Rotate team roles regularly between builders and breakers to enhance empathy and understanding of each perspective, leading to more robust design choices.
Leer y comparar varias metodologías, recomendamos el
> Amplio repositorio de metodologías <
junto con otras más de 400 metodologías.
Sus comentarios sobre esta metodología o información adicional son bienvenidos en la dirección sección de comentarios ↓ , así como cualquier idea o enlace relacionado con la ingeniería.
Publicaciones relacionadas
Cuestionarios sobre molestias musculoesqueléticas
Pruebas multivariantes (MVT)
Análisis de regresión múltiple
Sistemas de captura de movimiento
Método MoSCoW
Prueba de la mediana de Mood